cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-44808,https://securityvulnerability.io/vulnerability/CVE-2023-44808,Stack Overflow Vulnerability in D-Link DIR-820L Router,"The D-Link DIR-820L router version 1.05B03 is susceptible to a stack overflow vulnerability in the sub_4507CC function, which could potentially allow an attacker to execute arbitrary code. This weakness can be exploited to compromise the device, leading to unauthorized access to the network and subsequent risks to data integrity and confidentiality. Users are encouraged to monitor their device security and apply any necessary patches or updates.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.002469999948516488,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0 CVE-2023-44809,https://securityvulnerability.io/vulnerability/CVE-2023-44809,Insecure Permissions Flaw in D-Link DIR-820L Router,"The D-Link DIR-820L router, specifically version 1.05B03, has been identified to have an insecure permissions vulnerability. This flaw can be exploited by attackers to gain unauthorized access to sensitive configurations and functionalities of the device, potentially compromising the entire network. Users are advised to ensure proper permissions are configured to mitigate potential security risks.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.009929999709129333,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0 CVE-2023-44807,https://securityvulnerability.io/vulnerability/CVE-2023-44807,Stack Overflow Vulnerability in D-Link DIR-820L Router,"The D-Link DIR-820L router is impacted by a stack overflow vulnerability within its cancelPing function. This flaw may allow attackers to exploit the buffer overflow, leading to potential remote code execution or denial of service. Users of impacted firmware versions are urged to apply the latest security updates to protect their devices.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.002259999979287386,false,false,false,false,,false,false,2023-10-06T00:00:00.000Z,0 CVE-2023-25282,https://securityvulnerability.io/vulnerability/CVE-2023-25282,,A heap overflow vulnerability in D-Link DIR820LA1_FW106B02 allows attackers to cause a denial of service via the config.log_to_syslog and log_opt_dropPackets parameters to mydlink_api.ccp.,D-Link,Dir-820l Firmware,6.5,MEDIUM,0.0009899999713525176,false,false,false,false,,false,false,2023-03-15T00:00:00.000Z,0 CVE-2023-25279,https://securityvulnerability.io/vulnerability/CVE-2023-25279,OS Command Injection Vulnerability in D-Link DIR820LA Router,"An OS command injection vulnerability exists in the firmware of the D-Link DIR820LA router, specifically version 1.05B03. This vulnerability allows attackers to craft specific payloads capable of escalating privileges to root level. Exploiting this flaw can lead to unauthorized access and potential control over the affected device, threatening the integrity of the user's network. It is crucial for users to apply the latest security updates from D-Link to mitigate this risk and protect their systems.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.008589999750256538,false,false,false,false,,false,false,2023-03-13T00:00:00.000Z,0 CVE-2023-25283,https://securityvulnerability.io/vulnerability/CVE-2023-25283,Stack Overflow Vulnerability in D-Link DIR Series Router,"A stack overflow vulnerability has been identified in the D-Link DIR820LA1_FW106B02 router. This flaw allows attackers to manipulate the reserveDHCP_HostName_1.1.1.0 parameter in lan.asp. Exploiting this vulnerability can lead to a denial of service, impacting the router's ability to perform standard functions and potentially disrupting network services. It is crucial for users to be aware of this vulnerability and to take proactive steps to secure their network devices.",D-Link,Dir-820l Firmware,7.5,HIGH,0.0020200000144541264,false,false,false,false,,false,false,2023-03-13T00:00:00.000Z,0 CVE-2022-26258,https://securityvulnerability.io/vulnerability/CVE-2022-26258,,D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.,D-Link,Dir-820l Firmware,9.8,CRITICAL,0.638159990310669,true,false,false,true,,false,false,2022-03-28T00:15:00.000Z,0 CVE-2021-45382,https://securityvulnerability.io/vulnerability/CVE-2021-45382,,"A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life (""EOL"") /End of Service Life (""EOS"") Life-Cycle and as such this issue will not be patched.",D-Link,Dir-820l Firmware,9.8,CRITICAL,0.9738699793815613,true,false,false,true,,false,false,2022-02-17T20:07:46.000Z,0